Skip to content

Commit a0dc335

Browse files
committed
Sync with GitHub Security Advisories
* Add CVE-2022-39224 for arr-pm * Add GHSA-4qw4-jpp4-8gvp for commonmarker * Update CVSSv3 for CVE-2022-27777 in actionview
1 parent d4e4e85 commit a0dc335

3 files changed

Lines changed: 82 additions & 0 deletions

File tree

gems/actionview/CVE-2022-27777.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ description: |
3939
## Workarounds
4040
4141
Escape the untrusted data before using it as a key for tag helper methods.
42+
cvss_v3: 6.1
4243
patched_versions:
4344
- "~> 5.2.7, >= 5.2.7.1"
4445
- "~> 6.0.4, >= 6.0.4.8"

gems/arr-pm/CVE-2022-39224.yml

Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
gem: arr-pm
3+
cve: 2022-39224
4+
ghsa: 88cv-mj24-8w3q
5+
url: https://github.com/jordansissel/ruby-arr-pm/security/advisories/GHSA-88cv-mj24-8w3q
6+
title: arr-pm vulnerable to arbitrary shell execution when extracting or listing files contained in a malicious rpm
7+
date: 2022-09-21
8+
description: |+
9+
### Impact
10+
11+
Arbitrary shell execution is possible when using RPM::File#files and
12+
RPM::File#extract if the RPM contains a malicious "payload compressor" field.
13+
14+
This vulnerability impacts the `extract` and `files` methods of the
15+
`RPM::File` class in the affected versions of this library.
16+
17+
### Patches
18+
19+
Version 0.0.12 is available with a fix for these issues.
20+
21+
### Workarounds
22+
23+
When using an affected version of this library (arr-pm), ensure any RPMs
24+
being processed contain valid/known payload compressor values. Such values
25+
include: gzip, bzip2, xz, zstd, and lzma.
26+
27+
You can check the payload compressor field in an rpm by using the rpm command
28+
line tool. For example:
29+
30+
```
31+
% rpm -qp example-1.0-1.x86_64.rpm --qf "%{PAYLOADCOMPRESSOR}\n"
32+
gzip
33+
```
34+
35+
### Impact on known dependent projects
36+
37+
This library is used by [fpm](https://github.com/jordansissel/fpm). The
38+
vulnerability may impact fpm only when using the flag `-s rpm` or
39+
`--input-type rpm` to convert a malicious rpm to another format. It does
40+
not impact creating rpms.
41+
cvss_v3: 7.0
42+
patched_versions:
43+
- ">= 0.0.12"
44+
related:
45+
url:
46+
- https://github.com/jordansissel/ruby-arr-pm/pull/14
47+
- https://github.com/jordansissel/ruby-arr-pm/pull/15
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
---
2+
gem: commonmarker
3+
ghsa: 4qw4-jpp4-8gvp
4+
url: https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-4qw4-jpp4-8gvp
5+
title: Unbounded resource exhaustion in cmark-gfm autolink extension may lead to denial of service
6+
date: 2022-09-21
7+
description: |
8+
### Impact
9+
10+
CommonMarker uses `cmark-gfm` for rendering [Github Flavored
11+
Markdown](https://github.github.com/gfm/). A polynomial time complexity issue
12+
in cmark-gfm's autolink extension may lead to unbounded resource exhaustion
13+
and subsequent denial of service.
14+
15+
### Patches
16+
17+
This vulnerability has been patched in the following CommonMarker release:
18+
19+
- v0.23.6
20+
21+
### Workarounds
22+
23+
Disable use of the autolink extension.
24+
25+
### References
26+
https://en.wikipedia.org/wiki/Time_complexity
27+
patched_versions:
28+
- ">= 0.23.6"
29+
related:
30+
url:
31+
- https://github.com/gjtorikian/commonmarker/pull/190
32+
- https://github.com/gjtorikian/commonmarker/releases/tag/v0.23.6
33+
ghsa:
34+
- cgh3-p57x-9q7q

0 commit comments

Comments
 (0)