Skip to content

Commit 5342735

Browse files
renatolondreedloden
authored andcommitted
1 parent 95c288d commit 5342735

6 files changed

Lines changed: 98 additions & 0 deletions

File tree

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
library: rubygems
3+
cve: 2019-8320
4+
url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
5+
title: Delete directory using symlink when decompressing tar
6+
date: 2019-03-05
7+
description: |
8+
A Directory Traversal issue was discovered in RubyGems 2.7.6 and later
9+
through 3.0.2. Before making new directories or touching files (which now
10+
include path-checking code for symlinks), it would delete the target
11+
destination. If that destination was hidden behind a symlink, a malicious gem
12+
could delete arbitrary files on the user’s machine, presuming the attacker
13+
could guess at paths. Given how frequently gem is run as sudo, and how
14+
predictable paths are on modern systems (/tmp, /usr, etc.), this could
15+
likely lead to data loss or an unusable system.
16+
unaffected_versions:
17+
- "< 2.7.6"
18+
patched_versions:
19+
- ">= 3.0.3"
20+
- "~> 2.7.9"
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
library: rubygems
3+
cve: 2019-8321
4+
url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
5+
title: Escape sequence injection vulnerability in verbose
6+
date: 2019-03-05
7+
description: |
8+
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since
9+
Gem::UserInteraction#verbose calls say without escaping, escape sequence
10+
injection is possible.
11+
unaffected_versions:
12+
- "< 2.6"
13+
patched_versions:
14+
- ">= 3.0.3"
15+
- "~> 2.7.9"
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
library: rubygems
3+
cve: 2019-8322
4+
url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
5+
title: Escape sequence injection vulnerability in gem owner
6+
date: 2019-03-05
7+
description: |
8+
An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem
9+
owner command outputs the contents of the API response directly to stdout.
10+
Therefore, if the response is crafted, escape sequence injection may occur.
11+
unaffected_versions:
12+
- "< 2.6"
13+
patched_versions:
14+
- ">= 3.0.3"
15+
- "~> 2.7.9"
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
library: rubygems
3+
cve: 2019-8323
4+
url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
5+
title: Escape sequence injection vulnerability in api response handling
6+
date: 2019-03-05
7+
description: |
8+
An issue was discovered in RubyGems 2.6 and later through 3.0.2.
9+
Gem::GemcutterUtilities#with_response may output the API response to stdout
10+
as it is. Therefore, if the API side modifies the response, escape sequence
11+
injection may occur.
12+
unaffected_versions:
13+
- "< 2.6"
14+
patched_versions:
15+
- ">= 3.0.3"
16+
- "~> 2.7.9"
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
library: rubygems
3+
cve: 2019-8324
4+
url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
5+
title: Installing a malicious gem may lead to arbitrary code execution
6+
date: 2019-03-05
7+
description: |
8+
An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted
9+
gem with a multi-line name is not handled correctly. Therefore, an attacker
10+
could inject arbitrary code to the stub line of gemspec, which is eval-ed by
11+
code in ensure_loadable_spec during the preinstall check.
12+
13+
unaffected_versions:
14+
- "< 2.6"
15+
patched_versions:
16+
- ">= 3.0.3"
17+
- "~> 2.7.9"
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
library: rubygems
3+
cve: 2019-8325
4+
url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
5+
title: Escape sequence injection vulnerability in errors
6+
date: 2019-03-05
7+
description: |
8+
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since
9+
Gem::CommandManager#run calls alert_error without escaping, escape sequence
10+
injection is possible. (There are many ways to cause an error.)
11+
unaffected_versions:
12+
- "< 2.6"
13+
patched_versions:
14+
- ">= 3.0.3"
15+
- "~> 2.7.9"

0 commit comments

Comments
 (0)